Webinar Registration

Firewalls are like Roach Motels – rules check in but they don’t checkout. When you look at a firewall with thousands (or tens of thousands) of rules you have to wonder if they are all still needed. But when you see something like

Where do you start? What systems are behind these 2 IP addresses? What application is communicating over https? Are the systems still active? Or have they been decommissioned? Just because the IP address answers a ping doesn’t mean it’s the same system as when the rule was created. Answering those questions definitively could easily take hours and drag into days while you wait for different departments and teams to respond to emailed questions.

A build up over years of outdated rules is bad enough for security and performance, but it turns out that a lot of rules added to firewalls are bad from the beginning. Here’s several ways that happens:

1) The requesting team or department specifies broad port or IP address requirements leading to overly permissive rules.
2) Exact port requirements are not understood but immediate network access is required. A temporary rule goes in, allowing any kind of traffic between specified IP addresses. Rule is never revisited.

The firewall experts at FireMon are sponsoring this webinar and I think you’ll love it when Tim Woods briefly shows you how FireMon can automate the work flow of firewall change requests, capture and document the information above, and help you evaluate the impact rules and compare rules to the characteristics of the actual packets being passed by those rules.

Please join me for this real training for free event.

First Name:

Last Name:

Work Email:

Phone:

Job Title:

Organization:

Country:

City:

State:

Zip/Postal Code:

Industry:

Company Size:

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us.